nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
An effective approach to offline Arabic handwriting recognition
|
Al Abodi, Jafaar |
|
2014 |
40 |
6 |
p. 1883-1901 19 p. |
artikel |
2 |
An efficient and scalable plagiarism checking system using Bloom filters
|
Geravand, Shahabeddin |
|
2014 |
40 |
6 |
p. 1789-1800 12 p. |
artikel |
3 |
An improved remote user authentication scheme with key agreement
|
Kumari, Saru |
|
2014 |
40 |
6 |
p. 1997-2012 16 p. |
artikel |
4 |
A novel fuzzy identity based signature scheme based on the short integer solution problem
|
Yao, Yanqing |
|
2014 |
40 |
6 |
p. 1930-1939 10 p. |
artikel |
5 |
A survey of traffic-based routing metrics in family of expected transmission count for self-organizing networks
|
Shi, Fei |
|
2014 |
40 |
6 |
p. 1801-1812 12 p. |
artikel |
6 |
Behavioral-model-based freehand tracking in a Selection-Move-Release system
|
Feng, Zhiquan |
|
2014 |
40 |
6 |
p. 1827-1837 11 p. |
artikel |
7 |
Collaborative trust aware intelligent intrusion detection in VANETs
|
Kumar, Neeraj |
|
2014 |
40 |
6 |
p. 1981-1996 16 p. |
artikel |
8 |
Communication storage optimization for static dataflow with access patterns under periodic scheduling and throughput constraint
|
Wang, G.Q. |
|
2014 |
40 |
6 |
p. 1858-1873 16 p. |
artikel |
9 |
Defeating buffer overflow attacks via virtualization
|
Tian, Donghai |
|
2014 |
40 |
6 |
p. 1940-1950 11 p. |
artikel |
10 |
Defense against SYN flooding attacks: A particle swarm optimization approach
|
Jamali, Shahram |
|
2014 |
40 |
6 |
p. 2013-2025 13 p. |
artikel |
11 |
Design and verification of an efficient WISHBONE-based network interface for network on chip
|
Swaminathan, K. |
|
2014 |
40 |
6 |
p. 1838-1857 20 p. |
artikel |
12 |
Detecting copy-move forgery under affine transforms for image forensics
|
Li, Leida |
|
2014 |
40 |
6 |
p. 1951-1962 12 p. |
artikel |
13 |
Diffusion wavelet-based analysis on traffic matrices by different diffusion operators
|
Tian, Hui |
|
2014 |
40 |
6 |
p. 1874-1882 9 p. |
artikel |
14 |
Dynamic stochastic resonance-based improved logo extraction in discrete cosine transform domain
|
Jha, Rajib Kumar |
|
2014 |
40 |
6 |
p. 1917-1929 13 p. |
artikel |
15 |
Editorial Board
|
|
|
2014 |
40 |
6 |
p. IFC- 1 p. |
artikel |
16 |
Efficient forward secure identity-based shorter signature from lattice
|
Zhang, Xiaojun |
|
2014 |
40 |
6 |
p. 1963-1971 9 p. |
artikel |
17 |
Efficient group Diffie–Hellman key agreement protocols
|
Harn, Lein |
|
2014 |
40 |
6 |
p. 1972-1980 9 p. |
artikel |
18 |
Introduction to the special issue on Recent advances in security and privacy in distributed communications (third edition)
|
Perez, Gregorio Martinez |
|
2014 |
40 |
6 |
p. 1903-1905 3 p. |
artikel |
19 |
Secure Hamming distance based record linkage with malicious adversaries
|
Zhang, Bo |
|
2014 |
40 |
6 |
p. 1906-1916 11 p. |
artikel |
20 |
Underground distribution BPL connections with (N +1)-hop repeater systems: A novel capacity mitigation technique
|
Lazaropoulos, Athanasios G. |
|
2014 |
40 |
6 |
p. 1813-1826 14 p. |
artikel |